Google Tag - Kutztown, Pennsylvania | Lantek

    blog-img

    If you know how to use functions and various other features that Microsoft Excel and Google Sheets have to offer, then you can take your skills one step further than most. One such feature is the use of dropdown menus within cells. Let’s discuss how you can use them to your benefit in both Excel and Sheets.

    Read More
    blog-img

    How often do you receive requests for meetings or other time-sensitive reminders through your email inbox, only to forget that you signed up for them weeks or months later? Sometimes it can be easier to just add an event to your calendar right from your email inbox. Let’s go over how you can add an event reminder to your Google Calendar right from your Gmail inbox so you never miss an important date or deadline again.

    Read More
    blog-img

    There are a ton of productivity suites out there, and we’ve all heard of the most common one, Microsoft Office. Still, there are other solutions out there, one of which is Google Workspace. What does Google Workspace offer, and what differentiates it from its competition? Let’s take a closer look and see if we can find the answer to this question.

    Read More
    blog-img

    Google Chat—the successor to Hangouts—offers a TON of features to its users, more so than most users probably realize. For instance, there are a lot of features buried under keyboard shortcuts. Let’s go over some of these shortcuts and what you can use them for in Google Chat.

    Read More
    blog-img

    Google Chrome is a widely used and popular web browser, and because of its popularity, it is a common target for hackers. A recent study showcases how there are more zero-day threats being discovered for Google Chrome, but don’t despair; it might not be a bad thing for your favorite web browser. Instead, it could signify exactly the opposite.

    Read More
    blog-img

    Certain methods used by hackers are more effective than others, and it’s largely in part due to these methods working around and subverting popular security measures. They might take on the look of a legitimate email or web source, like social media, in an attempt to convince the user that it is indeed a message they can trust. The latest in this type of hacking attack includes Google Docs.

    Read More
    blog-img

    Wouldn’t it be nice if you had an easy way to track your device even if it were lost or stolen? Thankfully, this feature exists to an extent for Android devices in the form of the IMEI, or international mobile equipment identity number. If you know this number, you could potentially help mitigate the issues that losing a device can present.

    Read More
    blog-img

    At this point, the term “collaboration” has fully transitioned from an intriguing operational ideal, to an overhyped buzzword, to a legitimately essential consideration for any modern business to embrace. As such, it makes sense that there are so many collaboration-geared applications available today, with so many options to pursue this collaboration baked into each.

    Read More
    blog-img

    Your privacy on the Internet matters, even if you don’t think you have anything to hide. Over the last few years, this has become more and more evident as we watch tech giants profit off of understanding the people who use their services. Facebook, Amazon, and Google are among them. Google in particular has made some recent policy changes that are worth understanding.

    Read More
    blog-img

    If you’re a user of Google Chrome, there are probably a few browser tabs that you frequently have open. Here, we wanted to go into a few tips to help you get the utmost use out of these tabs, highlighting a few neat features Chrome offers.

    Read More